Over the past 8 months, we have had the unique opportunity to speak with more than 100 leaders and business executives to glean their perspectives on the cybersecurity and digital challenges that they are facing, and what would help empower them as they look forward in their businesses.
Below are some key takeaways from these conversations:
- The increasing use of cloud computing is creating new cybersecurity challenges. Cloud computing offers many benefits, but it also introduces new security risks. For example, businesses that store data in the cloud need to make sure that their data is properly encrypted and that they have access control measures in place.
- The number and sophistication of cyberattacks are growing, and businesses are struggling to keep up. This is leading to a growing sense of “confusion avoidance” among boards and C-level executives, who are reluctant to make decisions about cybersecurity for fear of making the wrong one.
- AI is on a rampage across virtually every industry. This is causing technical debt to increase due to both companies and individuals rushing to capitalize on its benefits, without governing its downsides.
- The proliferation of mobile devices is making it more difficult to secure data. Mobile devices are becoming increasingly popular, but they are also more difficult to secure. This is because mobile devices are often used in unsecured environments, and they are more likely to be lost or stolen.
- The growing number of remote workers is increasing the attack surface. Remote workers are more likely to be targeted by cyberattacks because they are often using unsecured networks and devices. Businesses that have remote workers need to make sure that they have strong security measures in place to protect their data.
- Cybersecurity is an ongoing investment. It is not something that can be achieved once and then forgotten about. Businesses need to invest in cybersecurity on an ongoing basis to stay ahead of the latest threats to their unique operation.
On behalf of the entire Valor team, we are excited to bring you this report. We look forward to providing leaders not only a greater understanding of complex cybersecurity topics but helping secure their most trusted assets.
We hope you benefit from reading this report and it empowers your security journey forward.


Want to find out if your organization is vulnerable or protected?
Our Leadership

Greg Tomchick attended Florida State College and Old Dominion University before being selected in the 27th round of the 2015 MLB June Amateur Draft by the St. Louis Cardinals. A six-foot-four-inch right-handed pitcher, Tomchick played for three seasons in the minor leagues before deciding to pursue his other passion, running a software development company he had founded while earning his Bachelor of Science in Business at the Strome College of Business.
Unfortunately, Greg’s company was the victim of a vicious cyber-attack that crippled the business, damaging its reputation and profits, and forcing its eventual closure. That’s when Greg decided to embark upon a career in cybersecurity with the intent of helping other business leaders secure their most valuable assets from the dangerous and evolving cyber threats they face.
After conducting more than 200 cyber threat assessments for organizations across government and the Fortune 50, Greg co-founded Valor where, as Partner and CEO, he is more committed than ever to helping professional sports organizations, private equity firms, and other digitally evolving businesses to bolster their cyber defenses. Through his unique lens as a former professional athlete, entrepreneur, cyber-attack victim, and cybersecurity expert, Greg and his team are particularly focused on identifying and mitigating cyber threats up front, and, when necessary, countering cyber-attacks with a targeted and strategic set of responses.
Greg and his team at Valor know that the cyber threat landscape is constantly changing, and that only the most informed, nimble, and prepared organizations will remain secure.
Be the first to share this report
You can help us by sharing this report with a leader who could use better information to protect against cyber threats.
Share on facebook
Share on twitter
Share on linkedin
Share on email